SELinux - Date Index
[Prev Page][Next Page]
- [PATCH v34 07/29] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 08/29] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 03/29] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 05/29] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 02/29] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v34 00/29] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/4] libsepol: add sepol_av_perm_to_string
- From: James Carter <jwcart2@xxxxxxxxx>
- ANN: SELinux userspace 3.4-rc1 release candidate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2] setfiles.8: -q is deprecated and has no effect
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH V3 Notebook] How to add a new policy capability
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] setfiles.8: -q is deprecated and has no effect
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2 4/6] libsepol/cil: comment out unused function __cil_verify_rule
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libselinux/utils: check for valid contexts to improve error causes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH net] sctp: use the correct skb for security_sctp_assoc_request
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH v2 3/6] libsepol/cil: post process pirqcon rules
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 2/6] libsepol/cil: drop unused function cil_tree_error
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v2 1/6] libsepol/cil: declare file local functions static
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH net] sctp: use the correct skb for security_sctp_assoc_request
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH net] sctp: use the correct skb for security_sctp_assoc_request
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH net] sctp: use the correct skb for security_sctp_assoc_request
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/3] libsemanage: Fix USE_AFTER_FREE (CWE-672) in semanage_direct_get_module_info()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] Split po/ translation files into the relevant sub-directories
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] policycoreutils: drop usage of egrep in fixfiles
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v3] libsemanage: Fall back to semanage_copy_dir when rename() fails
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol: mark immutable mls and context parameter const
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol: add missing oom checks
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsepol/cil: silence GCC 12 array-bounds false positive
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2 1/6] libsepol/cil: declare file local functions static
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] policycoreutils: drop usage of egrep in fixfiles
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 2/6] libsepol/cil: drop unused function cil_tree_error
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 3/6] libsepol/cil: post process pirqcon rules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 4/6] libsepol/cil: comment out unused function __cil_verify_rule
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH net] sctp: use the correct skb for security_sctp_assoc_request
- From: Xin Long <lucien.xin@xxxxxxxxx>
- [PATCH v2 5/6] libsemanage: ignore missing prototypes in swig generated code
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 6/6] Enable missing prototypes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] libselinux/utils: check for valid contexts to improve error causes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] setfiles.8: -q is deprecated and has no effect
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] firmware_loader: use kernel credentials when reading firmware
- From: Thiébaud Weksteen <tweek@xxxxxxxxxx>
- [PATCH] github: add some basic GH Actions to build the notebook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] github: add some basic GH Actions to build the notebook
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH Notebook] checkreqprot is being deprecated
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] optional statement is not valid in if and require statement
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH Notebook] SELINUX=disabled is being deprecated
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH Notebook] Reference Policy: Module versioning now optional
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] Split po/ translation files into the relevant sub-directories
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Add a file describing the security vulnerability handling process
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: checkreqprot is deprecated, add some ssleep() discomfort
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux/utils: check for valid contexts to improve error causes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] selinux: log anon inode class name
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] selinux: declare data arrays const
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 4/5] selinux: Remove redundant assignments
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsemanage: Fix USE_AFTER_FREE (CWE-672) in semanage_direct_get_module_info()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] policycoreutils/setfiles: Improve description of -d switch
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH V2 Notebook] How to add a new policy capability
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net] sctp: use the correct skb for security_sctp_assoc_request
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] firmware_loader: use kernel credentials when reading firmware
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] firmware_loader: use kernel credentials when reading firmware
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [RFC PATCH 4/4] Enable missing prototypes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 3/4] libsepol/cil: post process pirqcon rules
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 2/4] libsepol/cil: drop unused function cil_tree_error
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH 1/4] libsepol/cil: declare file local functions static
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] sepolgen: Update permission map
- From: Karl MacMillan <karl@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol: mark immutable mls and context parameter const
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: silence GCC 12 array-bounds false positive
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: add missing oom checks
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] sepolgen: Update permission map
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2] libsepol: Replace calls to mallocarray() with calls to calloc()
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2 3/3] mcstrans: Fir RESOURCE_LEAK and USE_AFTER_FREE coverity scan defects
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 3/3] mcstrans: Fir RESOURCE_LEAK and USE_AFTER_FREE coverity scan defects
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 2/3] semodule_package: Close leaking fd
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 1/3] libsemanage: Fix USE_AFTER_FREE (CWE-672) in semanage_direct_get_module_info()
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] policycoreutils/setfiles: Improve description of -d switch
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] Split po/ translation files into the relevant sub-directories
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Translate or not?
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH 4/5] selinux: Remove redundant assignments
- From: Michal Orzel <michalorzel.eng@xxxxxxxxx>
- Re: Lets start with 3.4 userspace release
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 1/4] libsepol/cil: declare file local functions static
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 4/4] Enable missing prototypes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 2/4] libsepol/cil: drop unused function cil_tree_error
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 3/4] libsepol/cil: post process pirqcon rules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libselinux/utils: check for valid contexts to improve error causes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: mark immutable mls and context parameter const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/2] libsepol: mark immutable common helper parameter const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: add missing oom checks
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol/cil: silence GCC 12 array-bounds false positive
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: Lets start with 3.4 userspace release
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] libsepol: Replace calls to mallocarray() with calls to calloc()
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] Add a file describing the security vulnerability handling process
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Validate conditional expressions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Use calloc when initializing bool_val_to_struct array
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Write a message when a log message is truncated
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] secilc: kernel policy language is infix
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] secilc: kernel policy language is infix
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Use calloc when initializing bool_val_to_struct array
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH v3] libsemanage: Fall back to semanage_copy_dir when rename() fails
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libsepol: Use calloc when initializing bool_val_to_struct array
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: Lets start with 3.4 userspace release
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Use calloc when initializing bool_val_to_struct array
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Use calloc when initializing bool_val_to_struct array
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Use calloc when initializing bool_val_to_struct array
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Use calloc when initializing bool_val_to_struct array
- From: Joshua Brindle <joshua.brindle@xxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Use calloc when initializing bool_val_to_struct array
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Lets start with 3.4 userspace release
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 1/8] selinux: use correct type for context length
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 1/8] selinux: use correct type for context length
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 01/12] selinux: use correct type for context length
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 01/16] LSM: general protection fault in legacy_parse_param
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 05/16] selinux: use correct type for context length
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 01/29] LSM: general protection fault in legacy_parse_param
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 01/21] LSM: general protection fault in legacy_parse_param
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.17 22/43] selinux: allow FIOCLEX and FIONCLEX with policy capability
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 07/21] selinux: allow FIOCLEX and FIONCLEX with policy capability
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 06/21] selinux: use correct type for context length
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 13/29] selinux: allow FIOCLEX and FIONCLEX with policy capability
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 11/29] selinux: use correct type for context length
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.16 14/35] selinux: use correct type for context length
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.16 01/35] LSM: general protection fault in legacy_parse_param
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.16 17/35] selinux: allow FIOCLEX and FIONCLEX with policy capability
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.17 15/43] selinux: use correct type for context length
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.17 01/43] LSM: general protection fault in legacy_parse_param
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] Add a file describing the security vulnerability handling process
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH] Add a file describing the security vulnerability handling process
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libselinux: Close leaked FILEs
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v19 1/4] Add flags option to get xattr method paired to __vfs_getxattr
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v19 1/4] Add flags option to get xattr method paired to __vfs_getxattr
- From: "Luca Weiss" <luca.weiss@xxxxxxxxxxxxx>
- [PATCH v3] libsemanage: Fall back to semanage_copy_dir when rename() fails
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [PATCH v2] libsemanage: Fall back to semanage_copy_dir when rename() fails
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libsemanage: Fallback to semanage_copy_dir when rename() failed
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libsemanage: Fallback to semanage_copy_dir when rename() failed
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.18
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] SELinux patches for v5.18
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] optional statement is not valid in if and require statement
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH v2] optional statement is not valid in if and require statement
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- [PATCH] optional statement is not valid in if and require statement
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [ANNOUNCE][CFP] Linux Security Summit North America 2022
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Pwnkit and SELinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Pwnkit and SELinux
- From: Daniel Burgener <dburgener@xxxxxxxxxxxxxxxxxxx>
- [PATCH] libsepol: Validate conditional expressions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v33 27/29] Audit: Add record for multiple object security contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v33 27/29] Audit: Add record for multiple object security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v33 26/29] Audit: Add record for multiple task security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v33 25/29] Audit: Allow multiple records in an audit_buffer
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v33 27/29] Audit: Add record for multiple object security contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v33 26/29] Audit: Add record for multiple task security contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v33 25/29] Audit: Allow multiple records in an audit_buffer
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] gui: do not recreate /etc/selinux/config
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: Close leaked FILEs
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol: Use calloc when initializing bool_val_to_struct array
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v1] fs: Fix inconsistent f_mode
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v1] fs: Fix inconsistent f_mode
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] fs: Fix inconsistent f_mode
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] fs: Fix inconsistent f_mode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v33 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v1] fs: Fix inconsistent f_mode
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/17] io_uring: add infra and support for IORING_OP_URING_CMD
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1] fs: Fix inconsistent f_mode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 03/17] io_uring: add infra and support for IORING_OP_URING_CMD
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 03/17] io_uring: add infra and support for IORING_OP_URING_CMD
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 0/2 RFC] libsepol: Adding support for not-self rules
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Don't add constraint if there are no permissions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Shorten the policy capability enum names
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: Do a more thorough validation of constraints
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol: reject xperm av rules in conditional statements
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: fix reallocarray imports
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] policycoreutils/fixfiles: Use parallel relabeling
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol: reject xperm av rules in conditional statements
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Vivek Goyal <vgoyal@xxxxxxxxxx>
- [PATCH] gui: do not recreate /etc/selinux/config
- From: Mikhail Novosyolov <m.novosyolov@xxxxxxxxxxxx>
- [PATCH] libselinux: Close leaked FILEs
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH v33 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v33 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v33 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v33 27/29] Audit: Add record for multiple object security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 28/29] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 29/29] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 25/29] Audit: Allow multiple records in an audit_buffer
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 26/29] Audit: Add record for multiple task security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 24/29] LSM: Add a function to report multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 23/29] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 22/29] Audit: Keep multiple LSM data in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 21/29] LSM: Extend security_secid_to_secctx to include module selection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 18/29] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 16/29] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 17/29] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 19/29] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 20/29] binder: Pass LSM identifier for confirmation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 15/29] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 13/29] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 12/29] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 14/29] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 09/29] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 11/29] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 10/29] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 06/29] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 08/29] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 07/29] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 05/29] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 04/29] LSM: provide lsm name and id slot mappings
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 03/29] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 02/29] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 01/29] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v33 00/29] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Shorten the policy capability enum names
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v1] fs: Fix inconsistent f_mode
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- [PATCH] libsepol/cil: Write a message when a log message is truncated
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v1] fs: Fix inconsistent f_mode
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: Recently fixed neverallowx checks report (range 0x)
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] selinux: checkreqprot is deprecated, add some ssleep() discomfort
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux: checkreqprot is deprecated, add some ssleep() discomfort
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: validate expressions by evaluating
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/2] libsepol: validate boolean datum arrays
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: reject xperm av rules in conditional statements
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: log anon inode class name
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] selinux: log anon inode class name
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2 4/5] selinux: declare data arrays const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 5/5] selinux: drop unnecessary NULL check
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 3/5] selinux: use consistent pointer types for boolean arrays
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- libsemanage rename calls fail on containers
- From: Joseph Marrero Corchado <jmarrero@xxxxxxxxxx>
- Recently fixed neverallowx checks report (range 0x)
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH] libsepol: Shorten the policy capability enum names
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: fix reallocarray imports
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v32 03/28] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v32 24/28] Audit: Add framework for auxiliary records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v32 03/28] LSM: Add the lsmblob data structure.
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v32 24/28] Audit: Add framework for auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v32 26/28] Audit: Add record for multiple object security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND] xfs: don't generate selinux audit messages for capability testing
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v32 24/28] Audit: Add framework for auxiliary records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v32 26/28] Audit: Add record for multiple object security contexts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v32 24/28] Audit: Add framework for auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v32 24/28] Audit: Add framework for auxiliary records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v32 24/28] Audit: Add framework for auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v32 24/28] Audit: Add framework for auxiliary records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: validate expressions by evaluating
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol: Do a more thorough validation of constraints
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] semanage-fcontext.8: Drop extra )s after FILE_SPEC
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/4] newrole: add Makefile target to test build options
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: NULL pointer offset fix
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH V2] libsepol: Add 'ioctl_skip_cloexec' policy capability
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsemanage: allow spaces in user/group names
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libselinux: Strip spaces before values in config
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python/sepolgen: accept square brackets in FILENAME token
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH RESEND] xfs: don't generate selinux audit messages for capability testing
- From: Eric Sandeen <sandeen@xxxxxxxxxxx>
- [PATCH] libsepol: fix reallocarray imports
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH v32 24/28] Audit: Add framework for auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] semanage-fcontext.8: Drop extra )s after FILE_SPEC
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] selinux: shorten the policy capability enum names
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] policycoreutils/fixfiles: Use parallel relabeling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/4] newrole: add Makefile target to test build options
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH RESEND] xfs: don't generate selinux audit messages for capability testing
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH RESEND] xfs: don't generate selinux audit messages for capability testing
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] semanage-fcontext.8: Drop extra )s after FILE_SPEC
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFC PATCH] selinux: runtime disable is deprecated, add some ssleep() discomfort
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: shorten the policy capability enum names
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] docs: selinux: add '=' signs to kernel boot options
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RESEND] xfs: don't generate selinux audit messages for capability testing
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH RESEND] xfs: don't generate selinux audit messages for capability testing
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH] docs: selinux: add '=' signs to kernel boot options
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH RESEND] xfs: don't generate selinux audit messages for capability testing
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v19 0/4] overlayfs override_creds=off & nested get xattr fix
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: NULL pointer offset fix
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH V2] libsepol: Add 'ioctl_skip_cloexec' policy capability
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsemanage: allow spaces in user/group names
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libselinux: Strip spaces before values in config
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libselinux: Strip spaces before values in config
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] python/sepolgen: accept square brackets in FILENAME token
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH v2 3/4] libsepol: export functions for policy analysis
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] docs: fix 'make htmldocs' warning in SCTP.rst
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V3] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V4] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] userfaultfd, capability: introduce CAP_USERFAULTFD
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] userfaultfd, capability: introduce CAP_USERFAULTFD
- From: Axel Rasmussen <axelrasmussen@xxxxxxxxxx>
- [PATCH V2] libsepol: Add 'ioctl_skip_cloexec' policy capability
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V4] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V3] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] userfaultfd, capability: introduce CAP_USERFAULTFD
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH Notebook] policy_config_statements.md: How to add a new capability
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] userfaultfd, capability: introduce CAP_USERFAULTFD
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH V3] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: log anon inode class name
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH Notebook] policy_config_statements.md: How to add a new capability
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] userfaultfd, capability: introduce CAP_USERFAULTFD
- From: Axel Rasmussen <axelrasmussen@xxxxxxxxxx>
- Re: [PATCH 0/4 v2] libsepol/cil: Limit certain error and warning reports
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 00/16 v2] Refactor and fix assertion checking
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libsepol: Populate and use policy name
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.17 (#2)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] userfaultfd, capability: introduce CAP_USERFAULTFD
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] userfaultfd, capability: introduce CAP_USERFAULTFD
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] userfaultfd, capability: introduce CAP_USERFAULTFD
- From: Axel Rasmussen <axelrasmussen@xxxxxxxxxx>
- [PATCH Notebook] policy_config_statements.md: How to add a new capability
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH testsuite] tests/ioctl: Update ioctl tests
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH] libsepol: Add 'ioctl_skip_cloexec' policy capability
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH V3] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for v5.17 (#2)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 4/5] selinux: declare data arrays const
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix misuse of mutex_is_locked()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] libsepol: validate expressions by evaluating
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 4/4] libsepol: add policy utilities
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 3/4] libsepol: export functions for policy analysis
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 2/4] libsepol: introduce sepol_const_security_context_t typedef
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH v2 1/4] libsepol: add sepol_av_perm_to_string
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/4] newrole: ensure password memory erasure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/4] newrole: check for crypt(3) failure
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/4] newrole: silence compiler warnings
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/4] newrole: add Makefile target to test build options
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: validate expressions by evaluating
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: NULL pointer offset fix
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/bpf: use new API if version >= 0.6
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] libselinux: Strip spaces before values in config
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] selinux: fix misuse of mutex_is_locked()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH V2] security/selinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: [PATCH 0/4 v2] libsepol/cil: Limit certain error and warning reports
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 00/16 v2] Refactor and fix assertion checking
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libsepol: Populate and use policy name
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH testsuite] tests/bpf: use new API if version >= 0.6
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] checkpolicy: allow wildcard permissions in constraints
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol: use correct error type to please UBSAN
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH userspace v2 1/6] libsemanage: add missing include to boolean_record.c
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 5/5] selinux: drop unnecessary NULL check
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 4/5] selinux: declare data arrays const
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 5/5] selinux: drop unnecessary NULL check
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 4/5] selinux: declare data arrays const
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/5] selinux: use consistent pointer types for boolean arrays
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/5] selinux: use correct type for context length
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/5] selinux: drop return statement at end of void functions
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- [PATCH v2] policycoreutils/fixfiles: Use parallel relabeling
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: [PATCH] security: declare member holding string literal const
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] mm: create security context for memfd_secret inodes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] security: declare member holding string literal const
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] capability: use new capable_or functionality
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 1/2] capability: add capable_or to test for multiple caps with exactly one audit message
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [RFC PATCH 2/2] capability: use new capable_or functionality
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: log anon inode class name
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] mm: create security context for memfd_secret inodes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/5] selinux: drop return statement at end of void functions
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/5] selinux: declare data arrays const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/5] selinux: use consistent pointer types for boolean arrays
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 5/5] selinux: drop unnecessary NULL check
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/5] selinux: use correct type for context length
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] security: declare member holding string literal const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libselinux: Strip spaces before values in config
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils/fixfiles: Use parallel relabeling
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH net v3 2/2] security: implement sctp_assoc_established hook in selinux
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH net v3 2/2] security: implement sctp_assoc_established hook in selinux
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] libselinux: Strip spaces before values in config
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] libsemanage: allow spaces in user/group names
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [RFC PATCH 0/1] SELinux-namespaces
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] policycoreutils/fixfiles: Use parallel relabeling
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [RFC PATCH 0/1] SELinux-namespaces
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH 0/1] SELinux-namespaces
- From: Igor Baranov <igor.baranov@xxxxxxxxxx>
- [RFC PATCH 1/1] selinuxns: Replace state pointer with namespace id
- From: Igor Baranov <igor.baranov@xxxxxxxxxx>
- [PATCH v2] libsepol: Populate and use policy name
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net v3 0/2] security: fixups for the security hooks in sctp
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net v3 2/2] security: implement sctp_assoc_established hook in selinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH net v3 0/2] security: fixups for the security hooks in sctp
- From: Richard Haines <richard_c_haines@xxxxxxxxxxxxxx>
- Re: [PATCH net v3 0/2] security: fixups for the security hooks in sctp
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH net v3 2/2] security: implement sctp_assoc_established hook in selinux
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH net v3 2/2] security: implement sctp_assoc_established hook in selinux
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH net v3 2/2] security: implement sctp_assoc_established hook in selinux
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] libsepol: use correct error type to please UBSAN
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] python/sepolgen: accept square brackets in FILENAME token
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] python/sepolgen: accept square brackets in FILENAME token
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Limit the amount of reporting for neverallow violations
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH testsuite v3] tests/sctp: add client peeloff tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Jeffrey Vander Stoep <jeffv@xxxxxxxxxx>
- Re: [PATCH net v3 0/2] security: fixups for the security hooks in sctp
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite v2] tests/sctp: add client peeloff tests
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH net v3 2/2] security: implement sctp_assoc_established hook in selinux
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH net v3 1/2] security: add sctp_assoc_established hook
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH net v3 0/2] security: fixups for the security hooks in sctp
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Limit the amount of reporting for neverallow violations
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- Re: [PATCH userspace v2 1/6] libsemanage: add missing include to boolean_record.c
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Ensure that the class in a classcommon is a kernel class
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol/cil: Do not copy blockabstracts when inheriting a block
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2] libsepol/cil: Don't add constraint if there are no permissions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/2] libsepol: Don't write out constraint if it has no permissions
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] checkpolicy: allow wildcard permissions in constraints
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/3] libsepol: validate several flags
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/3] libsepol: more strict constraint validation
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/3] libsepol: use correct error type to please UBSAN
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v2] checkpolicy: allow wildcard permissions in constraints
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] checkpolicy: allow wildcard permissions in constraints
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH testsuite] tests/binder: Adjust kernel uapi headers check for building
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH testsuite] tests/binder: Adjust kernel uapi headers check for building
- From: "GONG, Ruiqi" <gongruiqi1@xxxxxxxxxx>
- Re: [PATCH testsuite] tests/binder: Build only for 4.11 and later kernels
- From: Gong Ruiqi <gongruiqi1@xxxxxxxxxx>
- RE: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit North America 2022
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: [PATCH] libsepol/cil: Ensure that the class in a classcommon is a kernel class
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/3] libsepol/cil: Do not copy blockabstracts when inheriting a block
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: [PATCH] policycoreutils: handle argument counter of zero
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: do not add gaps to string list
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: Semantics vs. usage of mutex_is_locked()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- Re: Semantics vs. usage of mutex_is_locked()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Semantics vs. usage of mutex_is_locked()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Dominick Grift <dominick.grift@xxxxxxxxxxx>
- Re: [PATCH] selinux: parse contexts for mount options early
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] libsepol: add policy utilities
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- [PATCH] checkpolicy: allow wildcard permissions in constraints
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/2] libsepol: add policy utilities
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/2] libsepol: add sepol_av_perm_to_string
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [GIT PULL] SELinux fixes for v5.17 (#1)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [GIT PULL] SELinux fixes for v5.17 (#1)
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH userspace v2 6/6] semodule: add command-line option to detect module changes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 5/6] libsemanage: optionally rebuild policy when modules are changed externally
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 3/6] libsemanage: move compressed file handling into a separate object
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 4/6] libsemanage: clean up semanage_direct_commit() a bit
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 0/6] Optionally rebuild policy store only if there were external changes to modules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 2/6] semodule,libsemanage: move module hashing into libsemanage
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH userspace v2 1/6] libsemanage: add missing include to boolean_record.c
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v32 28/28] AppArmor: Remove the exclusive flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 27/28] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 26/28] Audit: Add record for multiple object security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 25/28] Audit: Add record for multiple task security contexts
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 24/28] Audit: Add framework for auxiliary records
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 23/28] Audit: Create audit_stamp structure
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 22/28] Audit: Keep multiple LSM data in audit_names
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 21/28] LSM: Extend security_secid_to_secctx to include module selection
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 20/28] binder: Pass LSM identifier for confirmation
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 19/28] NET: Store LSM netlabel data in a lsmblob
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 18/28] LSM: security_secid_to_secctx in netlink netfilter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 17/28] LSM: Use lsmcontext in security_inode_getsecctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 16/28] LSM: Use lsmcontext in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 15/28] LSM: Ensure the correct LSM context releaser
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 14/28] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 13/28] LSM: Use lsmblob in security_cred_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 12/28] LSM: Use lsmblob in security_inode_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 11/28] LSM: Use lsmblob in security_current_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 10/28] LSM: Use lsmblob in security_ipc_getsecid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 09/28] LSM: Use lsmblob in security_secid_to_secctx
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 08/28] LSM: Use lsmblob in security_secctx_to_secid
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 07/28] LSM: Use lsmblob in security_kernel_act_as
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 06/28] LSM: Use lsmblob in security_audit_rule_match
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 05/28] IMA: avoid label collisions with stacked LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 04/28] LSM: provide lsm name and id slot mappings
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 03/28] LSM: Add the lsmblob data structure.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 02/28] LSM: Infrastructure management of the sock security
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 01/28] integrity: disassociate ima_filter_rule from security_audit_rule
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v32 00/28] LSM: Module stacking for AppArmor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: do not add gaps to string list
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] selinux: fix double free of cond_list on error paths
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] selinux: parse contexts for mount options early
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] selinux: fix double free of cond_list on error paths
- Re: [PATCH 1/3] selinux: consistently clear cond_list on error paths
- From: Vratislav Bendel <vbendel@xxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: [PATCH v2] selinux: various sparse fixes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] selinux: parse sids earlier to avoid doing memory allocations under spinlock
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/3] selinux: remove duplicate cond_list clean up calls
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] selinux: consistently clear cond_list on error paths
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] selinux: consistently clear cond_list on error paths
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: kmod and unsigned modules
- From: Chris PeBenito <chpebeni@xxxxxxxxxxxxxxxxxxx>
- kmod and unsigned modules
- From: Russell Coker <russell@xxxxxxxxxxxx>
- [PATCH v3 2/2] selinux: try to use preparsed sid before calling parse_sid()
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- [PATCH v3 0/2] selinux: parse sids earlier to avoid doing memory allocations under spinlock
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- [PATCH v3 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH testsuite] tests/binder: Build only for 4.11 and later kernels
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH 0/3] selinux: Fix and clean policydb->cond_list error paths
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] libsepol: do not add gaps to string list
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: Populate and use policy name
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: Populate and use policy name
- From: "Thiébaud Weksteen" <tweek@xxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- [PATCH 3/3] selinux: remove duplicate cond_list clean up calls
- [PATCH 1/3] selinux: consistently clear cond_list on error paths
- [PATCH 2/3] selinux: fix double free of cond_list on error paths
- [PATCH 0/3] selinux: Fix and clean policydb->cond_list error paths
- Re: [PATCH v2] selinux: various sparse fixes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: various sparse fixes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] LSM: general protection fault in legacy_parse_param
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2] LSM: general protection fault in legacy_parse_param
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: split no transition execve check
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] LSM: general protection fault in legacy_parse_param
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: fix a type cast problem in cred_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: various sparse fixes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] selinux: various sparse fixes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH v2] selinux: various sparse fixes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] selinux: fix a type cast problem in cred_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix a type cast problem in cred_init_security()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH v2] LSM: general protection fault in legacy_parse_param
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] selinux: various sparse fixes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix a type cast problem in cred_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix a type cast problem in cred_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix a type cast problem in cred_init_security()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [PATCH] selinux: various sparse fixes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v2] LSM: general protection fault in legacy_parse_param
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] selinux: fix a type cast problem in cred_init_security()
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] selinux: fix a type cast problem in cred_init_security()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: invert only valid range of role bitmap
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v3] libsepol: handle type gaps
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: drop trailing newlines in log messages
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: return failure on saturated class name length
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH] selinux: split no transition execve check
- From: Chris PeBenito <pebenito@xxxxxxxx>
- [PATCH] libselinux: Prevent cached context giving wrong results
- From: Johannes Segitz <jsegitz@xxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH] mm: create security context for memfd_secret inodes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] selinux: split no transition execve check
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: general protection fault in legacy_parse_param
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: handle argument counter of zero
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 9/9] selinux: drop unused macro
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 8/9] selinux: simplify cred_init_security
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 7/9] selinux: do not discard const qualifier in cast
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH 6/9] selinux: drop unused parameter of avtab_insert_node
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 5/9] selinux: drop cast to same type
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 4/9] selinux: enclose macro arguments in parenthesis
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 3/9] selinux: declare name parameter of hash_eval const
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] policycoreutils: handle argument counter of zero
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: general protection fault in legacy_parse_param
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH 2/9] selinux: declare path parameters of _genfs_sid const
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH 1/9] selinux: check return value of sel_make_avc_files
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH -next] selinux: access superblock_security_struct in LSM blob way
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: general protection fault in legacy_parse_param
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: general protection fault in legacy_parse_param
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: [PATCH 9/9] selinux: drop unused macro
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] LSM: general protection fault in legacy_parse_param
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] SELinux: Always allow FIOCLEX and FIONCLEX
- From: Demi Marie Obenour <demiobenour@xxxxxxxxx>
- Re: [PATCH v3] libsepol: handle type gaps
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: invert only valid range of role bitmap
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 4/9] selinux: enclose macro arguments in parenthesis
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 1/9] selinux: check return value of sel_make_avc_files
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH -next] selinux: access superblock_security_struct in LSM blob way
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH userspace 2/5] semodule,libsemanage: move module hashing into libsemanage
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- Re: [PATCH] libselinux: Cached security context not accurate
- From: Petr Lautrbach <plautrba@xxxxxxxxxx>
- [RFC PATCH] selinux: split no transition execve check
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libsepol: drop trailing newlines in log messages
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: return failure on saturated class name length
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH] mm: create security context for memfd_secret inodes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 1/9] selinux: check return value of sel_make_avc_files
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 6/9] selinux: drop unused parameter of avtab_insert_node
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 5/9] selinux: drop cast to same type
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 4/9] selinux: enclose macro arguments in parenthesis
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 9/9] selinux: drop unused macro
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 8/9] selinux: simplify cred_init_security
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 7/9] selinux: do not discard const qualifier in cast
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 3/9] selinux: declare name parameter of hash_eval const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH 2/9] selinux: declare path parameters of _genfs_sid const
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: invert only valid range of role bitmap
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH v3] libsepol: handle type gaps
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH -next] selinux: access superblock_security_struct in LSM blob way
- From: "GONG, Ruiqi" <gongruiqi1@xxxxxxxxxx>
- Re: [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Cached security context not accurate
- From: Johannes Segitz <jsegitz@xxxxxxx>
- Re: [RFC PATCH userspace 4/5] libsemanage: optionally rebuild policy when modules are changed externally
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [RFC PATCH userspace 2/5] semodule,libsemanage: move module hashing into libsemanage
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] libselinux: Cached security context not accurate
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libselinux: Cached security context not accurate
- From: Johannes Segitz <jsegitz@xxxxxxx>
- Re: [RFC PATCH userspace 5/5] semodule: add command-line option to detect module changes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH userspace 5/5] semodule: add command-line option to detect module changes
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH userspace 4/5] libsemanage: optionally rebuild policy when modules are changed externally
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH userspace 3/5] libsemanage: move compressed file handling into a separate object
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [RFC PATCH userspace 2/5] semodule,libsemanage: move module hashing into libsemanage
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH RFC v2 1/2] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- [PATCH RFC v2 0/2] selinux: parse sids earlier to avoid doing memory allocations under spinlock
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- [PATCH RFC v2 2/2] selinux: try to use preparsed sid before calling parse_sid()
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH] libsepol: reject invalid roles before inverting
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: reject invalid roles before inverting
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [libselinux][PATCH] libselinux: make threadsafe for discover_class_cache
- From: Purushottam Choudhary <purushottamchoudhary29@xxxxxxxxx>
- Re: [PATCH] libsepol: reject invalid roles before inverting
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH v2] libsepol: handle type gaps
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 4/4 v2] libsepol/cil: Limit the amount of reporting for context rule conflicts
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 3/4 v2] libsepol/cil: Limit the neverallow violations reported
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/4 v2] libsepol/cil: Provide more control over reporting bounds failures
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/4 v2] libsepol/cil: Add cil_get_log_level() function
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/4 v2] libsepol/cil: Limit certain error and warning reports
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol: drop trailing newlines in log messages
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH v2] libsepol: handle type gaps
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- [PATCH] libsepol: return failure on saturated class name length
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Limit the amount of reporting for neverallow violations
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH RFC] selinux: Fix selinux_sb_mnt_opts_compat()
- From: Scott Mayhew <smayhew@xxxxxxxxxx>
- Re: [PATCH] libsepol: check for saturated class name length
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH 1/2] libsepol/cil: Limit the amount of reporting for neverallow violations
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH] libsepol: reject invalid roles before inverting
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Strip spaces before values in config
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- Re: [RFC PATCH userspace 5/5] semodule: add command-line option to detect module changes
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: Strip spaces before values in config
- From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx>
- Re:[PATCH] selinux: check the return value of audit_log_start()
- From: "Xiaoke Wang" <xkernel.wang@xxxxxxxxxxx>
- [PATCH] selinux: check the return value of audit_log_start()
- From: xkernel.wang@xxxxxxxxxxx
- Re: [PATCH 1/2] libsepol/cil: Limit the amount of reporting for neverallow violations
- From: bauen1 <j2468h@xxxxxxxxxxxxxx>
- [PATCH 2/2] libsepol/cil: Limit the amount of reporting for context rule conflicts
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2] libsepol/cil: Limit the amount of reporting for neverallow violations
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] policycoreutils: Improve error message when selabel_open fails
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [PATCH] libselinux: Strip spaces before values in config
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
- [PATCH] libsepol/cil: Ensure that the class in a classcommon is a kernel class
- From: James Carter <jwcart2@xxxxxxxxx>
- [RFC PATCH userspace 4/5] libsemanage: optionally rebuild policy when modules are changed externally
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH userspace 5/5] semodule: add command-line option to detect module changes
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH userspace 3/5] libsemanage: move compressed file handling into a separate object
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH userspace 2/5] semodule,libsemanage: move module hashing into libsemanage
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH userspace 1/5] libsemanage: add missing include to boolean_record.c
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- [RFC PATCH userspace 0/5] Allow rebuilding policy store only if there were external changes to modules
- From: Ondrej Mosnacek <omosnace@xxxxxxxxxx>
- Re: [PATCH] selinux-notebook: Add epub build
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH V2 4/4] selinux-notebook: Add epub build
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH testsuite] tests/binder: Build only for 4.11 and later kernels
- From: "GONG, Ruiqi" <gongruiqi1@xxxxxxxxxx>
- Re: [PATCH v2] libsepol: handle type gaps
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] libsepol: check for saturated class name length
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [PATCH] ci: run the tests under ASan/UBsan on GHActions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 2/2 RFC] libsepol/cil: Add notself and minusself support to CIL
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 1/2 RFC] libsepol: Add not self support for neverallow rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 0/2 RFC] libsepol: Adding support for not-self rules
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 16/16 v2] libsepol: Fix two problems with neverallowxperm reporting
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 15/16 v2] libsepol: Set args avtab pointer when reporting assertion violations
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 14/16 v2] libsepol: The src and tgt must be the same if neverallow uses self
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 13/16 v2] libsepol: Make return value clearer when reporting neverallowx errors
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 12/16 v2] libsepol: Refactor match_any_class_permissions() to be clearer
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 11/16 v2] libsepol: Make use of previously created ebitmap when checking self
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 10/16 v2] libsepol: Move assigning outer loop index out of inner loop
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 09/16 v2] libsepol: Remove unnessesary check for matching class
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 06/16 v2] libsepol: Move check of target types to before check for self
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 07/16 v2] libsepol: Create function check_assertion_self_match() and use it
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 08/16 v2] libsepol: Use (rc < 0) instead of (rc) when calling ebitmap functions
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 03/16 v2] libsepol: Remove uneeded error messages in assertion checking
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 04/16 v2] libsepol: Check for error from check_assertion_extended_permissions()
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 05/16 v2] libsepol: Use consistent return checking style
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 02/16 v2] libsepol: Change label in check_assertion_avtab_match()
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 01/16 v2] libsepol: Return an error if check_assertion() returns an error.
- From: James Carter <jwcart2@xxxxxxxxx>
- [PATCH 00/16 v2] Refactor and fix assertion checking
- From: James Carter <jwcart2@xxxxxxxxx>
- Re: [GIT PULL] SELinux patches for v5.17
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] policycoreutils: Improve error message when selabel_open fails
- From: William Roberts <bill.c.roberts@xxxxxxxxx>
- [GIT PULL] SELinux patches for v5.17
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH] policycoreutils: Improve error message when selabel_open fails
- From: Vit Mojzis <vmojzis@xxxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]